Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-11-2020 10:50
Static task
static1
Behavioral task
behavioral1
Sample
Dori.ocx.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Dori.ocx.dll
Resource
win10v20201028
General
-
Target
Dori.ocx.dll
-
Size
141KB
-
MD5
745868c40e6f1d1d40ae60335417f6d7
-
SHA1
cfe42b4014fc22596b4305271c4a133492603349
-
SHA256
7a5e4fd35a1a636ef1beb7e62cc647d7e63f5c7aadd2aa1a49d49c81183aca93
-
SHA512
fae585aa131dfa0c5063991fe13938f73c83d78b43ee142ca39e767ec7db6ec7bb419522b4c0c6c210163b05e95db896388446dd8b70b7a29d4c6fe31d130b18
Malware Config
Signatures
-
Ursnif RM3
A heavily modified version of Ursnif discovered in the wild.
-
Blacklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 12 1596 rundll32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 932 cmd.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1636 timeout.exe -
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000dd11f628a0ee195a9ab54d0640aa69f6faa364fea368555a0b57da49e6bec212000000000e8000000002000020000000b5467264babea711c1685a365baa2efb004b97d3aad8066b85a98d8debe09db530010000b95e185044567f984c1960c96569537317052cc6614ce1527f120c7a1397794b7c2ab6ad0b7da0a909b947270e40562755d5bab35a034f23bae77c328f554c35b70a32603023ab96f144ed2aa40d9da5038f34868718c0425a7e1dad9d20de6794eba6ad2067232e9f61234e31af73aa1f409f320c6091f39124a0d05205b9930567b1576b43d8fc096fbc18be38687bf705f97d59968fe442bc07b1bc6499412d7b1444b274401fd278f466651bd7eaec513a8c3322f7b69250ce6f643e0727150ee6c536db76c3c2603e7a44ed6d4dadeac8a15b69cecfabd599321f028f36d08bfc7501e3d6e93b4f9bf37f3419c56c8e04fe950cae9762464223b291a619794d5c525fb0ec02b6545973eb5c5e3d23623c92862366d23225801dbe1c837ff407f1e28b1f37af3df8b7039e65521b40000000afff6d2be9c2e1721405959ff8689dee2a830808bfc35b018320b27620a375391b1d6de578cc90a467b1130c94fb47d1bf556ec9200951e048e54ba78f78bebc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{99B04C61-259D-11EB-B686-D2299A5963BB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60d7225aaab9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000db303641161b6737e083a747d5309f38ec7de1f388e31e30b2bfccc892529fbb000000000e80000000020000200000005bcbbc8835eeeafed4874789ae1a317c475ec8df89f0456224f5b4ab521a6ad320000000a8103892d463d8a5ef595f369c0874fe2e7644d2fd7371c4639c997eb68bfe0840000000aa3df40ad1412a783bf0a8488990a6cfca695f22ef3120a744ca7bb046e8618fcdc8d3a855226b60336094c49339d3b83782ff63cfaff1592061c6078dafebc2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A825C681-259D-11EB-B686-D2299A5963BB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{823D00A1-259D-11EB-B686-D2299A5963BB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000051adab82d2f9884333ba002571412c1625c32d4a3529eb81e5042d03e307e16d000000000e800000000200002000000000bd537d3766097b60efec986332bf6c460cfd7546c19ba603cdf512f559f24d3001000092f96ad2f5f55de5c6b2d400183af46b09867ca79662af7759627094b743f602a6e9bc81b487b430c4e87336e99d21632888e4dc7300f72caa0ed849e29b2b2773b8196004c9a0e8d8c95e9ae42d485ee97d3263df0a27fb8293fd2a0fbf4e89462024fe76b364a7674f815692761ff07b34d7d1a651909a9ab7538111280c1d34002de2d7ebbc642ba88d2beee0259548341cae2d75be187be2366cce7c3f8e65ff6c036d217e6b8ab1eeab2b70112f2607eda54a5bfa920b47fd31937119c15cf0553ffaa73a8335e54abbf8f7c8df85bdbca512513f4e6d0dbe2c882820ca0f3efbb473e1cfdc8b4bf5901b56fdb91d3c2ff8a787884b6ed5d4b38a01434aec6b615fe43dcf4e8f7539335db0b5f4c662f998bf6cf0115998a0f9b290f7adeafaf30257afb34969f915c07ec8e8d0400000001d29948d713efef19bff1114f97c4f6d71120da51a17a5add4dba1875069df31103a2ecb083bba9ee6ba60b6d7d1a6bb3d6c57c7757904948c56e6fefaf7c22e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1312 powershell.exe 1312 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
powershell.exepid process 1312 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1312 powershell.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exepid process 1832 iexplore.exe 1724 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe 1212 iexplore.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1832 iexplore.exe 1832 iexplore.exe 636 IEXPLORE.EXE 636 IEXPLORE.EXE 1724 iexplore.exe 1724 iexplore.exe 556 IEXPLORE.EXE 556 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 984 IEXPLORE.EXE 984 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 984 IEXPLORE.EXE 984 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 1584 IEXPLORE.EXE 1584 IEXPLORE.EXE 1212 iexplore.exe 1212 iexplore.exe 984 IEXPLORE.EXE 984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
rundll32.exeiexplore.exeiexplore.exeiexplore.execmd.exeforfiles.execmd.exepowershell.execsc.execsc.execmd.exedescription pid process target process PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1032 wrote to memory of 1596 1032 rundll32.exe rundll32.exe PID 1832 wrote to memory of 636 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 636 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 636 1832 iexplore.exe IEXPLORE.EXE PID 1832 wrote to memory of 636 1832 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 556 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 556 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 556 1724 iexplore.exe IEXPLORE.EXE PID 1724 wrote to memory of 556 1724 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 1584 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 1584 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 1584 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 1584 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 984 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 984 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 984 1212 iexplore.exe IEXPLORE.EXE PID 1212 wrote to memory of 984 1212 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 1264 1460 cmd.exe forfiles.exe PID 1460 wrote to memory of 1264 1460 cmd.exe forfiles.exe PID 1460 wrote to memory of 1264 1460 cmd.exe forfiles.exe PID 1264 wrote to memory of 748 1264 forfiles.exe cmd.exe PID 1264 wrote to memory of 748 1264 forfiles.exe cmd.exe PID 1264 wrote to memory of 748 1264 forfiles.exe cmd.exe PID 748 wrote to memory of 1312 748 cmd.exe powershell.exe PID 748 wrote to memory of 1312 748 cmd.exe powershell.exe PID 748 wrote to memory of 1312 748 cmd.exe powershell.exe PID 1312 wrote to memory of 1332 1312 powershell.exe csc.exe PID 1312 wrote to memory of 1332 1312 powershell.exe csc.exe PID 1312 wrote to memory of 1332 1312 powershell.exe csc.exe PID 1332 wrote to memory of 940 1332 csc.exe cvtres.exe PID 1332 wrote to memory of 940 1332 csc.exe cvtres.exe PID 1332 wrote to memory of 940 1332 csc.exe cvtres.exe PID 1312 wrote to memory of 1068 1312 powershell.exe csc.exe PID 1312 wrote to memory of 1068 1312 powershell.exe csc.exe PID 1312 wrote to memory of 1068 1312 powershell.exe csc.exe PID 1068 wrote to memory of 1656 1068 csc.exe cvtres.exe PID 1068 wrote to memory of 1656 1068 csc.exe cvtres.exe PID 1068 wrote to memory of 1656 1068 csc.exe cvtres.exe PID 1312 wrote to memory of 1192 1312 powershell.exe Explorer.EXE PID 932 wrote to memory of 1636 932 cmd.exe timeout.exe PID 932 wrote to memory of 1636 932 cmd.exe timeout.exe PID 932 wrote to memory of 1636 932 cmd.exe timeout.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#13⤵
- Blacklisted process makes network request
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit" /p C:\Windows\system32 /s /m po*l.e*e2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\forfiles.exeforfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit" /p C:\Windows\system32 /s /m po*l.e*e3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe/k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA5⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7BA5.tmp" "c:\Users\Admin\AppData\Local\Temp\np4dcq2f\CSC77967A9CD3C4438C813CAAD94155211.TMP"7⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D0C.tmp" "c:\Users\Admin\AppData\Local\Temp\diz55elw\CSCF909F4B0D455473CA0407E512F2C873.TMP"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:22⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:3159045 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
a69fba04d9b13e82fb772d1b38b6054a
SHA1f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454
SHA256733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff
SHA5126fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
4620d50f79ec1cca42a690528595a9b1
SHA147a728d0560971b261121052c798ce9182a1dac7
SHA256862ffccb24f35a8703eb7930b7a57e9889c9d2aa60341e0c098e29abfb383b72
SHA5124079db4a2b93cac8a14dcf31d01ba11e4010ccd565a322f79103ffef0ceac0abe76551e9ce0aef97ab7fc0c9aa536bba5d7c5bd9f07c63544c846d8102a0678c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
d2114a22d73ae21cd74d842fbd99c000
SHA16f299b5ca42485c4ae15143ae9867e10d4872411
SHA256a74954ec5c0c36911da88c29f41e2dc6b81f15a1263e538643831aa88dcfc616
SHA512aaaa60f3d2334af22fa049ef5f3d87b57334309181ff71eaf61ad7af798c37f5611442c5f7ba7d9f9ca6553cb25d3e99d76a37cc176c222e12fdb8ea0e56cfca
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.datMD5
0220e6c784cc3d09f399ee39cd703709
SHA13c2db917a9974e0e139361179a5c25ce549e4e42
SHA25649913545df4969aacb6660ef2de5109e9d63a20813854cb7d014c3f5650ca275
SHA5129b0d386f49b5b5de469cc4eefbf501c751bf5575802af35040784f543c10f0dd23619292446b3a543f9185d0b39b261c1459967987f4283e9274217741c7769e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.datMD5
fa5e036a4f2a150e17e4525c7245612b
SHA17725ef1b0e720634c26b53ba70bb9046c10c4185
SHA256c192ab6aabe05801ee676b923bc231c6d1b9f7887481950b1c802cf726338c76
SHA5121f65e60060ddd171664599ebd31b074714f5c71ad6fe398b6d3a3309563c8c938943f8d5447da9c9704938f2f21f9ca32d9384d3844197c655e2855165978184
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\favicon[1].icoMD5
a976d227e5d1dcf62f5f7e623211dd1b
SHA1a2a9dc1abdd3d888484678663928cb024c359ee6
SHA25666332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271
SHA5126754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f
-
C:\Users\Admin\AppData\Local\Temp\RES7BA5.tmpMD5
6eb960e3661cdfaa471359defc671637
SHA1b1158b78ead355b3ab181d5994ed139a5f759f55
SHA25676baa745e71721764bf441c9d885f916d0f4d9f4866ffadcefa939d20954119c
SHA5128d1d4a1be2139426bea5e32f020993c06bcc14c0a731ec09d526131464d2c3336178106f95043cbc2e8355687ed77dc1892ccba48255d888de6e8517cb8979fd
-
C:\Users\Admin\AppData\Local\Temp\RES7D0C.tmpMD5
a7ef42e3ece9345d31849090ea19248d
SHA185b1dba45b622f28999dd6ac9766a6ba53692c1e
SHA256849513d9544401dafac572e1a81ba01b40b2b32abc5793ad1e72a3f4e4518902
SHA51206c0e70b43363ff3a9510428ca9f10247aa95bde612350aca458d45a0b65cc38dbef89b0af5a0ecf6631b3bd4a694fd22a2e1b2c3497aca80b61722133e152d3
-
C:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.dllMD5
9f0bfbd342091675207307e7ada38e40
SHA16d89fadcbd9733b11554e921b3bca1a0c1829718
SHA2568edf7f888da3013d028a1b89fd15425b088512f25772d22ab865e1c0fd67cda1
SHA5125bb3dab2237e487bcca4fc910cf819639ab430d6baf552b8cc04208ff9ef4cf1ec1a90979d6ab52fe78e11c05f464b7ae1e328147455091f7a4c8c22a7a57b48
-
C:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.dllMD5
13a58bc41c4e96417836e74be18ff536
SHA14b24e25ca1442050f1e62977dd3005f7e18c3c2c
SHA2569a3dab5dd82adfbf9a74f8e5d80d4e0fce51481c6c9ef8f4f876277db48a7003
SHA512c5307680539756786ab497b07d63078c622e7013281e973849ee973f7c12d3a1ac617d74e452e2a94ed5be53dff8dbc6e715f66dfff9493dab9a5c3089340585
-
\??\c:\Users\Admin\AppData\Local\Temp\diz55elw\CSCF909F4B0D455473CA0407E512F2C873.TMPMD5
26571e1e5e6d1ff0415e14cf306b2826
SHA1c549602dcb1144fbe9c963a2afcc115095f2643d
SHA256eb7744a7fc13f7465f2f4f095ed7e5a80c011fc8446c9989441c9c3f8be6e626
SHA5127156baa002b4cc69bf8ea4cf3d63d1889d51c952535565e60d70b13ece290687b6d35c8f39496cbcb5ba7e67d8b0922097f1bcb73e60fcd116f86b845f13b924
-
\??\c:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.0.csMD5
a5043957e07dbe0dee7bb8aad13a403e
SHA1571c9136e0e90d016dd83b24c40eadbf7186c701
SHA25673775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9
SHA51214f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1
-
\??\c:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.cmdlineMD5
b57e57f81fee4de3258ef43c3af44eba
SHA131d208b4520e36803326f83a8ac18ba4a62d4ee9
SHA256d3bbf6e039f641fc6cafaed50c738fe4e596edf4258c92419d9f337ea28b38ab
SHA51206a4e601e1290ecb67dbd358feb0985f4804f08fbdc79c71d64302003df0d5c3b4a6e075db4eb309ddf690a7a0544910c2499b374401cddeb91e0560b6a07184
-
\??\c:\Users\Admin\AppData\Local\Temp\np4dcq2f\CSC77967A9CD3C4438C813CAAD94155211.TMPMD5
794bd39b9c64177a349e4571f63e3402
SHA1c470add77dffa70f479f94cfa76cbba95f35cb06
SHA256d12a9fcff4bf17d95befdcb7a96ed49f2013197672934ccf8e96739340b3ce27
SHA512a146b1910e481a7bb7e08d65c99b26f89ea510a4153c3b0bddfbba23a1a01db9a4012141d5448e9daab35c7484f978ba34e61cd585089a31f7d5fcc69988e8b7
-
\??\c:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.0.csMD5
aee5ecef6b6a9b4372991443276b71ce
SHA1911bd26fba4c5e51423f2c6339cc267f8697f339
SHA25690e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a
SHA512cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3
-
\??\c:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.cmdlineMD5
b9fe461420c3e8150781ac83c4e0f8ca
SHA1a9e10bb869b64219970ee26cd9da6b61ad3ed858
SHA25620119febc7ea5907622686cbfa27b1b4732db6a51e2743ced789a74d8caaf62b
SHA512558c3390a2519637219b7236938ab6e0380ce9cc04bcfab1e4ffbd3672a902843b243676e605d3677211b0bab79eec300931716bd1d3d51b1388f84f7e5e5300
-
memory/400-2-0x000007FEF6380000-0x000007FEF65FA000-memory.dmpFilesize
2.5MB
-
memory/556-4-0x0000000000000000-mapping.dmp
-
memory/636-3-0x0000000000000000-mapping.dmp
-
memory/748-104-0x0000000000000000-mapping.dmp
-
memory/940-116-0x0000000000000000-mapping.dmp
-
memory/984-17-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/984-24-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/984-31-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/984-21-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/984-100-0x0000000002C30000-0x0000000002C31000-memory.dmpFilesize
4KB
-
memory/984-26-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/984-12-0x0000000000000000-mapping.dmp
-
memory/984-19-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/984-29-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/1068-121-0x0000000000000000-mapping.dmp
-
memory/1264-103-0x0000000000000000-mapping.dmp
-
memory/1264-102-0x0000000000000000-mapping.dmp
-
memory/1312-112-0x000000001C340000-0x000000001C341000-memory.dmpFilesize
4KB
-
memory/1312-109-0x000000001A840000-0x000000001A841000-memory.dmpFilesize
4KB
-
memory/1312-129-0x000000001B570000-0x000000001B588000-memory.dmpFilesize
96KB
-
memory/1312-128-0x0000000002490000-0x0000000002491000-memory.dmpFilesize
4KB
-
memory/1312-120-0x00000000022F0000-0x00000000022F1000-memory.dmpFilesize
4KB
-
memory/1312-111-0x000000001B6F0000-0x000000001B6F1000-memory.dmpFilesize
4KB
-
memory/1312-110-0x0000000002380000-0x0000000002381000-memory.dmpFilesize
4KB
-
memory/1312-105-0x0000000000000000-mapping.dmp
-
memory/1312-106-0x000007FEF5180000-0x000007FEF5B6C000-memory.dmpFilesize
9.9MB
-
memory/1312-107-0x000000001A9A0000-0x000000001A9A1000-memory.dmpFilesize
4KB
-
memory/1312-108-0x000000001A9E0000-0x000000001A9E1000-memory.dmpFilesize
4KB
-
memory/1332-113-0x0000000000000000-mapping.dmp
-
memory/1584-72-0x0000000002F40000-0x0000000002F41000-memory.dmpFilesize
4KB
-
memory/1584-99-0x0000000002A50000-0x0000000002A52000-memory.dmpFilesize
8KB
-
memory/1584-62-0x0000000002F40000-0x0000000002F41000-memory.dmpFilesize
4KB
-
memory/1584-93-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/1584-83-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/1584-88-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/1584-39-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1584-41-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1584-44-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1584-46-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1584-49-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1584-67-0x0000000002F40000-0x0000000002F41000-memory.dmpFilesize
4KB
-
memory/1584-51-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1584-15-0x0000000002920000-0x0000000002922000-memory.dmpFilesize
8KB
-
memory/1584-14-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/1584-101-0x0000000006250000-0x0000000006273000-memory.dmpFilesize
140KB
-
memory/1584-13-0x0000000002920000-0x0000000002921000-memory.dmpFilesize
4KB
-
memory/1584-10-0x0000000000000000-mapping.dmp
-
memory/1596-1-0x00000000001C0000-0x00000000001D2000-memory.dmpFilesize
72KB
-
memory/1596-0-0x0000000000000000-mapping.dmp
-
memory/1636-130-0x0000000000000000-mapping.dmp
-
memory/1656-124-0x0000000000000000-mapping.dmp